Flashcards on Cybersecurity

Click on the flashcard to see the answer


What is cybersecurity?

Cybersecurity refers to the protection of computer systems and networks from theft, damage or unauthorized access.

What are some common cyber threats?

Some common cyber threats include phishing, malware, ransomware, and social engineering.

What is two-factor authentication?

Two-factor authentication is a security process in which a user provides two different authentication factors to verify their identity.

What is the difference between a virus and a worm?

A virus is a type of malware that attaches itself to a legitimate program, while a worm is a standalone malware program that spreads copies of itself throughout a network.

What is encryption?

Encryption is the process of converting data into a coded language to prevent unauthorized access.

What is a firewall?

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

What is a DDoS attack?

A DDoS (Distributed Denial of Service) attack is a type of cyberattack in which an attacker overwhelms a website or server with traffic from multiple sources, causing it to become unresponsive.

What is a VPN?

A VPN (Virtual Private Network) is a secure and encrypted connection between two or more devices over the internet.

What is malware?

Malware is a type of software that is designed to harm or exploit any programmable device, service, or network.

What is social engineering?

Social engineering refers to the manipulation of individuals to divulge confidential information or undertake an action through various deceptive techniques.

What is a zero-day vulnerability?

A zero-day vulnerability is a security flaw in a software application that is unknown to the software developer or vendor.

What is a security breach?

A security breach is an incident in which an attacker gains unauthorized access to a computer network or database, possibly using stolen credentials or exploiting a vulnerability in the system.

What is a botnet?

A botnet is a network of compromised computers or devices that are controlled by a hacker or cyber criminal without the owner's knowledge.

What is the CIA triad?

The CIA triad is a model used to guide information security policies and safeguarding information. CIA stands for confidentiality, integrity, and availability.

What is a vulnerability scanner?

A vulnerability scanner is a tool that identifies security holes in a computer system or network and provides a report of potential vulnerabilities.

What is cybersecurity?

Cybersecurity refers to the protection of computer systems and networks from theft, damage or unauthorized access.

What are some common cyber threats?

Some common cyber threats include phishing, malware, ransomware, and social engineering.

What is two-factor authentication?

Two-factor authentication is a security process in which a user provides two different authentication factors to verify their identity.

What is the difference between a virus and a worm?

A virus is a type of malware that attaches itself to a legitimate program, while a worm is a standalone malware program that spreads copies of itself throughout a network.

What is encryption?

Encryption is the process of converting data into a coded language to prevent unauthorized access.

What is a firewall?

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

What is a DDoS attack?

A DDoS (Distributed Denial of Service) attack is a type of cyberattack in which an attacker overwhelms a website or server with traffic from multiple sources, causing it to become unresponsive.

What is a VPN?

A VPN (Virtual Private Network) is a secure and encrypted connection between two or more devices over the internet.

What is malware?

Malware is a type of software that is designed to harm or exploit any programmable device, service, or network.

What is social engineering?

Social engineering refers to the manipulation of individuals to divulge confidential information or undertake an action through various deceptive techniques.

What is a zero-day vulnerability?

A zero-day vulnerability is a security flaw in a software application that is unknown to the software developer or vendor.

What is a security breach?

A security breach is an incident in which an attacker gains unauthorized access to a computer network or database, possibly using stolen credentials or exploiting a vulnerability in the system.

What is a botnet?

A botnet is a network of compromised computers or devices that are controlled by a hacker or cyber criminal without the owner's knowledge.

What is the CIA triad?

The CIA triad is a model used to guide information security policies and safeguarding information. CIA stands for confidentiality, integrity, and availability.

What is a vulnerability scanner?

A vulnerability scanner is a tool that identifies security holes in a computer system or network and provides a report of potential vulnerabilities.

Share


Login to Save


Share



Login to Save


Explore Other Decks


Made for Grade 8

Low Level Languages, High Level Languages and Translation Programs


View Deck
Made for Grade 8

Maria Manoru 'Charlotte Obtaining... 13 Points'


View Deck
Made for Grade 3

Meghan Mac Donald 'Judy Moody meets a new teacher'


View Deck

Explore More